Starting dates and places

There are no known starting dates for this product.

Description

Prerequisites:

Delegates should have experience of at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant certifications, e.g., MCSE). Delegates must ensure that they have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org. Current requirements for the CISSP examination are to be found at ISC2.org.

Frequently asked questions

Prerequisites:

Delegates should have experience of at least two of the domains in
the (CBK), for 5 years or more (4 years if they have achieved
relevant certifications, e.g., MCSE).
Delegates must ensure that they have some knowledge of all CBK
domains and are encouraged to read one or two of the books on the
Reading List at ISC2.org.
Current requirements for the CISSP examination are to be found at
ISC2.org.

Course Description:

The course addresses the ten knowledge domains that comprise the
Common Body of Knowledge (CBK) for information systems security
professionals and prepares delegates for CISSP certification. The
course offers a job-related approach to the security process,
demonstrating the immediate application of concepts and techniques
described in the CBK and providing a basic introduction to security
management, architecture and engineering.

The course comprises ten sessions that map directly to the
(CBK)®, each one is theory based with instructor led discussions,
there are no hands on labs. The work completed in the classroom
should be complimented by extra reading, references to internet
resources will be provided by the instructor.

This course includes the following modules:

Access to Information Systems

Control Data Access

Control System Access

Determine an Access Control Administration Method

Perform a Penetration Test

Networking Systems and Telecommunications

Design Data Networks

Provide Remote Access to a Data Network

Secure a Data Network

Manage a Data Network

Security Management

Determine Security Management Goals

Classify Information

Develop a Security Program

Manage Risk

Applications Security

Perform Software Configuration Management

Implement Software Controls

Secure Database Systems

Cryptography

Apply a Basic Cipher

Select a Symmetric Key Cryptography Method

Select an Asymmetric Key Cryptography Method

Determine Email Security

Determine Internet Security

Securing System Architecture

Evaluate Security Models

Choose a Security Mode

Provide System Assurance

Operations Security

Control Operations Security

Audit and Monitor Systems

Handle Threats and Violations

Business Continuity Planning

Sustain Business Processes

Perform Business Impact Analysis

Define Disaster Recovery Strategies

Test the Disaster Recovery Plan

Physical Security

Control Physical Access

Monitor Physical Access

Establish Physical Security Methods

Design Secure Facilities

Law, Investigations, and Ethics

Interpret Computer Crime Laws and Regulations

Apply the Evidence Life Cycle

Perform an Investigation

Identify Codes of Conduct

For online live training advice please visit our
Learning Advice Centre on our website. Be sure to follow us on
Twitter to receive special course offers, news and updates!